Search
Search Results
-
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware
Regulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how...
-
Lessons on off-policy methods from a notification component of a chatbot
This work serves as a review of our experience applying off-policy techniques to train and evaluate a contextual bandit model powering a...
-
Category Creation Between Digital and Analog Sensemaking Tools in a Cognitive Immersive Environment
This paper compares the category creation process during a user study experiment in a cognitive immersive sensemaking environment between an analog... -
The rise of “security and privacy”: bibliometric analysis of computer privacy research
The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...
-
Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation
With the fast development of information technology, more and more computation applications are served in the cloud and cooperate together to provide... -
Ontology-Based Interaction Design for Social-Ecological Systems Research
Contemporary social-ecological systems (SESs) research that supports policy and decision-making to tackle sustainability issues requires... -
Studying topic engagement and synergy among candidates for 2020 US Elections
This article provides a comprehensive summary of how candidates running in the 2020 US Presidential Elections used Twitter to communicate with the...
-
Language Ideology Bias in Conversational Technology
The beliefs that we have about language are called language ideologies and influence how we create and use language technologies. In this paper, we... -
Data Usage Control
Data-driven business models are based on sharing and exchanging data. However, to establish a trustworthy and secure data exchange between different... -
Development
During software development iterations, we create computer programs. Programs, or more precisely software source code files, are examples of... -
The value sensitive design of a preventive health check app
In projects concerning big data, ethical questions need to be answered during the design process. In this paper the Value Sensitive Design method is...
-
Challenges of Cyber Security in Insurance Business
Greater use of information technology, electronic communication and digitization, exposes business entities to cyber threats and endangers their... -
Introduction
Crops are the basis of human survival, and the growth state and yield of crops are not only vital to agricultural production, but also to the healthy... -
eSticky: An Advanced Remote Reminder System for People with Early Dementia
While the European population is ageing, the number of people with dementia is dramatically rising. With this comes an increased need for products...
-
Strategy
Serverless architecture is quite unlike the previous evolutions of cloud software. As such, existing cloud management strategies are often... -
Tock Systems Management
So far, the chapters in this book have focused on application and system development using Tock. In a development environment, deploying a custom... -
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...
-
Is academia becoming more localised? The growth of regional knowledge networks within international research collaboration
It is well-established that the process of learning and capability building is core to economic development and structural transformation. Since...
-
Eight grand challenges for value sensitive design from the 2016 Lorentz workshop
In this article, we report on eight grand challenges for value sensitive design, which were developed at a one-week workshop, Value Sensitive Design:...
-
Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges
The world of big data has unlocked novel avenues for organizations to generate value via sharing data. Current data ecosystem initiatives such as...